首页> 外文会议>IEEE International Conference on Big Data Science and Engineering >DroidContext: Identifying Malicious Mobile Privacy Leak Using Context
【24h】

DroidContext: Identifying Malicious Mobile Privacy Leak Using Context

机译:DroidContext:使用上下文识别恶意移动隐私泄漏

获取原文

摘要

Serious concerns have been raised about stealthy leakage of users privacy in mobile apps, and many recent approaches are also proposed to detect privacy leak in these apps. However, more and more benign mobile apps have to send out user's privacy for legitimate functions or user intention. To evade detection, new mobile malware starts to mimic privacy-related behaviors of benign apps that provide similar functionality, and mix malicious privacy leak with benign ones to reduce the chance of being observed. Since prior proposed approaches primarily focus on the privacy leak discovery, these evasive techniques in new mobile malware will make differentiating between malicious and benign privacy disclosures a difficult task during privacy leak analysis. In this paper, we propose DroidContext, an automated system that detects truly malicious privacy leakages in Android apps. DroidContext differentiates malicious and benign privacy disclosures using contexts (e.g., activation events and dependent operations that trigger and control privacy leak execution), purifying the privacy leak detection results for automatic and easy interpretation by filtering out benign privacy disclosures. We implement a prototype of DroidContext and evaluate DroidContext on 5560 mobile malware and 4800 Apkure apps. Experiment results show that, on average, DroidContext achieves a high 92.85% true positive during malicious privacy identification and the 95.45% true positive during benign privacy disclosures identification. The necessity of proposed contexts is also evaluated. Evaluation indicates that to keep the accuracy of privacy disclosure classification, our proposed contexts are all necessary.
机译:在移动应用中隐藏用户隐私的隐身泄露已经提出了严重的问题,并且还提出了许多最近的方法来检测这些应用中的隐私泄漏。但是,越来越多的良性移动应用程序必须为合法函数或用户意图发送用户的隐私。为了逃避检测,新的手机恶意软件开始模仿提供类似功能的良性应用程序的隐私相关行为,并将恶意隐私泄漏与良性泄漏混合,以减少被观察到的机会。由于先前的拟议方法主要关注隐私泄漏发现,因此新的移动恶意软件中的这些避险技术将在隐私泄漏分析期间披露恶意和良性隐私之间的差异。在本文中,我们提出了DroidContext,这是一种自动化系统,可在Android应用中检测到真正恶意隐私泄漏。 DroidContext使用上下文(例如,激活事件和触发和控制隐私泄漏执行的依赖于依赖操作)来区分恶意和良性隐私披露,通过过滤良好的隐私披露来净化自动和简单地解释的隐私泄漏检测结果。我们实现了DroidContext的原型,并在5560移动恶意软件和4800 Apkure应用程序上评估DroidContext。实验结果表明,平均而言,DroidContext在恶意隐私识别期间达到92.85%的真实正面,良性隐私披露期间的95.45%真正的正面。还评估了所提出的上下文的必要性。评估表明,为了保持隐私披露分类的准确性,我们所提出的背景是必要的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号